SlideShare a Scribd company logo
1 of 36
Download to read offline
- Salesforce Pardot Marketing Automation & Data.com
- March 24, 2-5pm @ The Heldrich Hotel in New Brunswick
- 4th Annual PhillyForce Conference
- May 4, 8:30–5pm @ Quorum Science Center
- Salesforce World Tour NYC
- May 25 @ Javits Center
- New Jersey User Group Meeting
- Date TBD, Salesforce MVP to discuss Summer 16’ Release Notes
Securing Your Salesforce Org:
The Human Factor
New Jersey User Group Meeting
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such
uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially
from the results expressed or implied by the forward-looking statements we make. All statements other than statements of
historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth,
earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future
operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and
customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new
functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations
in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the
outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in
which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and man age
our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com
products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the
financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our
quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures
are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not cu rrently
available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions
based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these
forward-looking statements.
Agenda
① Setting the Stage: The Human Factor (15 mins)
② Attack Card exercise and discussion (30 mins)
③ Secure Behavior (15 mins)
④ Secure Your Salesforce Org (15 mins)
⑤ Next Steps (15 mins)
Setting the Stage:
The Human Factor
Why are we here?
Estimated
annual cost
of global
cybercrime
Today’s Target: The User
Bugs in Human Hardware
“Everybody else does it,
why shouldn´t I?”
“People are inherently
good and I want to be
helpful”
“Hmmmm…. I wonder
what will happen if I…”
“I´d be wrong not to!”
“If I don´t do this, I´ll get
in trouble!”
“I´ll get something if I do
this!”
Entry Point Methods
Attack Card Exercise
30 mins
Attack Card Instructions
Step 1
Have one person
in your group
read an attack
card aloud.
• What “Bugs in Human
hardware” and “Entry point
methods” were used in this
attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Step 2
For each attack
card discuss the
following:
Attack Card Exercise #1: Linked-Into the Network
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Attack Card Exercise #2: Download on the Road
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Group Discussion
10 minutes
• What Bugs in Human Hardware
and Entry Point Methods were
used in this attack?
• What's the earliest point that
the victim should have known
this was an attack?
• What could the individual have
done to prevent it?
• Do you think you would have
identified the attack in time? If
not, how would you have
defended yourself?
Entry Point Methods:
Bugs in Human Hardware:
Conformity, Fear, Reward,
Morality, Curiosity, Trust
Phishing/Malware, Rouge
Devices, Dumpster Diving,
Eaves-dropping, Badge Surfing,
Exploiting Public Info, Social
engineering
Secure Behavior
Educate Employees
Password Security
• Activate password complexity and rotation rules
 Password expiration/reset every 90 days
 Password length at least 8-10 characters
 Password complexity – mix alpha and numeric characters
• User education
 No password/credential sharing
 Discourage password reuse across services
 Utilization of a strong password manager (example: LastPass)
• Utilize two-factor authentication (2FA) and single sign-on (SSO)
Phishing Education
• Pervasive and effective attack vector for
installing malware
• Education is key to prevention
• https://trust.salesforce.com - recent
threats
• If unsure about a Salesforce email, ask us
via security@salesforce.com
• Don’t open attachments that are
unexpected or from unknown senders
Could your employees fall victim to phishing?
• Internet Creations sent a phishing test to employees
• https://getgophish.com
Security Awareness for Users
Small changes in behavior can have a major impact
14,000 50% 82%
Less Likely to Click on a Phishing
Link
More Likely to Report Threats to
security@salesforce.com
Salesforce Employees
Key Principles – The Human Factor
• Limit the number of users with admin rights
• Provide users with minimum access to do their job
• Create rigorous process for user
termination/deactivation
• Basic security training for all users on
credential/password security, phishing, and social
engineering
• Trailhead for ongoing, role-focused education
• Effective security requires cross-org communication
https://developer.salesforce.com/trailhead
Secure Your Salesforce Org
Trust: Security at Every Level
Applicable to the Sales Cloud, Service Cloud, Communities, Chatter, database.com, site.com and Force.com. For audits, certification and security information or other services,
please see the Trust & Compliance section of help.salesforce.com.
Infrastructure-level SecurityApplication-level Security
Firewall SSL
Accelerators
Web/App
Servers
Load
Balancers
Database
Servers
Trusted
Networks
Authentication
Options
Field Level
Security
Object Level
Security
(CRUD)
Audit Trail
Object History
Tracking
Salesforce Org Security
What is Two-Factor Authentication?
+
Two-Factor Authentication (2FA)
• Provides an extra layer of security
beyond a password
• If a user’s credentials are compromised,
much harder to exploit
• Require a numeric token on login
• Can be received via app, SMS, email,
hardware (YubiKey)
• Walkthrough in your own Org:
http://sforce.co/1VWwmpB
2FA Setup
​Create a permission set titled “Two Factor Authentication”
​Name | Setup | Manage Users | Permission Sets | New
Step 1
2FA Setup
​Select the “Two-Factor Authentication for User Interface Logins” permission and save this
permission set.
​Now assign this permission set to the required user by clicking:
​Manage Assignment | Add Assignments | Select users | Assign
Step 2
2FA Setup
​Upon the next login, users will come across the following prompt:
Step 3
Login IP Ranges
• Limit IP addresses that users can log into
Salesforce from (by profile)
• Can restrict by login or on every request
• Lock sessions to IP address they started on
• These features ensure that if a malicious
actor steals credentials they cannot use them
away from your corporate networks
• Working from home/road – VPN login
Login IP Ranges
• Recommended and available for all customers
• Only access Salesforce from a designated set of IP Ranges
• Two levels:
• Org-level Trusted IP Ranges (permissive)
• Profile-level Login IP Ranges (restrictive)
Enterprise, Unlimited, Performance, Developer:
Manage Users | Profiles
Contact Mgr, Group, Professional:
Security Controls | Session Settings
For moreinfo,searchHelp& Training
User Deactivation
• Deactivateusers as soon as possible
• Removes login access while
preserving historical activity and
records
• Sometimes users cannot be
deactivated: assign new user or
reassign approval responsibilityfirst
• Know your IT department’s
termination process
Best practice:
Freeze users first!
From Setup, click Manage Users | Users.
Click Edit next to a user’s name.
Deselect the Active checkbox and then click Save.
Next Steps
Key Takeaways
Check your Security Settings!
Activate and use turnkey security features:
• Enable two-factor authentication
• Implement identity confirmation
• Activate Login IP Ranges
• Deactivate users in a timely manner (freeze them first!)
Consider the human factor when training Salesforce users:
• Password security
• Emails / phishing
Resources
• Security for Admins Quick Reference Guide (available today!)
• Security & Compliance Release Webinars – What’s New in Security & Compliance, Spring
‘16 (Feb. 25, 8am PST)
• Trailhead: Data Security module (more coming soon!)
• Who Sees What video series (YouTube)
• Dreamforce session recordings (www.dreamforce.com)
• Secure Salesforce series
• Create a Salesforce Force Field for Your Users
• Security Implementation Guide
• ButtonClickAdmin.com
thank y u

More Related Content

What's hot

VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudSwapna Shetye
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security TestingMarco Morana
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tPriyanka Aash
 
Effective multi factor authentication for people soft
Effective multi factor authentication for people softEffective multi factor authentication for people soft
Effective multi factor authentication for people softAppsian
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing AttacksRapid7
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerDuo Security
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testingImaginea
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security FrameworkJerod Brennen
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introductiongbud7
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access ManagementLance Peterman
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishAli Kazmi
 
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...Codecamp Romania
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanAsad Zaman
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iPrecisely
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training briefBill Nelson
 

What's hot (20)

VAPT Infomagnum
VAPT InfomagnumVAPT Infomagnum
VAPT Infomagnum
 
VAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus CloudVAPT- A Service on Eucalyptus Cloud
VAPT- A Service on Eucalyptus Cloud
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Insider Threat
Insider ThreatInsider Threat
Insider Threat
 
Web Application Security Testing
Web Application Security TestingWeb Application Security Testing
Web Application Security Testing
 
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-tDefcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
Defcon 22-alex zacharis-nikolaos-tsagkarakis-po s-attacking-t
 
Effective multi factor authentication for people soft
Effective multi factor authentication for people softEffective multi factor authentication for people soft
Effective multi factor authentication for people soft
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHellerSecuring Access to PeopleSoft ERP with Duo Security and GreyHeller
Securing Access to PeopleSoft ERP with Duo Security and GreyHeller
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
 
Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Web Application Penetration Testing Introduction
Web Application Penetration Testing IntroductionWeb Application Penetration Testing Introduction
Web Application Penetration Testing Introduction
 
OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014OWASP Mobile TOP 10 2014
OWASP Mobile TOP 10 2014
 
Privleged Access Management
Privleged Access ManagementPrivleged Access Management
Privleged Access Management
 
Owasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publishOwasp top-10-mobile-risks-v-1-3 publish
Owasp top-10-mobile-risks-v-1-3 publish
 
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...Iasi code camp 12 october 2013   ana tudosa - challenges in implementing and ...
Iasi code camp 12 october 2013 ana tudosa - challenges in implementing and ...
 
Security testing
Security testingSecurity testing
Security testing
 
Two-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _ZamanTwo-factor authentication- A sample writing _Zaman
Two-factor authentication- A sample writing _Zaman
 
Best Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM iBest Practices for Multi-Factor Authentication on IBM i
Best Practices for Multi-Factor Authentication on IBM i
 
Penetration and hacking training brief
Penetration and hacking training briefPenetration and hacking training brief
Penetration and hacking training brief
 

Similar to Salesforce New Jersey User Group - Security Awareness

Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSalesforce Admins
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded AdminSalesforce Admins
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
 
ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017Salesforce Partners
 
10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org SecuritySalesforce Admins
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSalesforce Developers
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWshyamuop
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWshyamuopfive
 
An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)Salesforce Partners
 
Architect and Design Your App for Commercial Success
Architect and Design Your App for Commercial SuccessArchitect and Design Your App for Commercial Success
Architect and Design Your App for Commercial SuccessSalesforce Partners
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceShesh Kondi
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfahmad661583
 
Dreamforce 2015 How to Create an Amazing Experience
Dreamforce 2015 How to Create an Amazing ExperienceDreamforce 2015 How to Create an Amazing Experience
Dreamforce 2015 How to Create an Amazing ExperienceJonathon Moody
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherSalesforce Admins
 

Similar to Salesforce New Jersey User Group - Security Awareness (20)

Sensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité SalesforceSensibilisation à la Sécurité Salesforce
Sensibilisation à la Sécurité Salesforce
 
Secure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor AuthenticationSecure Your Salesforce Org with Two-Factor Authentication
Secure Your Salesforce Org with Two-Factor Authentication
 
How to Become a Security-Minded Admin
How to Become a Security-Minded AdminHow to Become a Security-Minded Admin
How to Become a Security-Minded Admin
 
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
 
ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017ISV Tech Enablement Webinar April 2017
ISV Tech Enablement Webinar April 2017
 
10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security10 Easy Steps to Mastering Org Security
10 Easy Steps to Mastering Org Security
 
Secure Salesforce: Org Access Controls
Secure Salesforce: Org Access ControlsSecure Salesforce: Org Access Controls
Secure Salesforce: Org Access Controls
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)An Insider's Guide to Security Review (October 13, 2014)
An Insider's Guide to Security Review (October 13, 2014)
 
Architect and Design Your App for Commercial Success
Architect and Design Your App for Commercial SuccessArchitect and Design Your App for Commercial Success
Architect and Design Your App for Commercial Success
 
Event Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityEvent Monitoring: Use Powerful Insights to Improve Performance and Security
Event Monitoring: Use Powerful Insights to Improve Performance and Security
 
FirstNet ICAM
FirstNet ICAMFirstNet ICAM
FirstNet ICAM
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
What’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & ComplianceWhat’s new in summer’15 release - Security & Compliance
What’s new in summer’15 release - Security & Compliance
 
KnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdfKnowBe4-Presentation-Overview.pdf
KnowBe4-Presentation-Overview.pdf
 
Dreamforce 2015 How to Create an Amazing Experience
Dreamforce 2015 How to Create an Amazing ExperienceDreamforce 2015 How to Create an Amazing Experience
Dreamforce 2015 How to Create an Amazing Experience
 
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco ErzingherTwo-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
Two-Factor Authentication: Easy Setup, Major Impact by Marco Erzingher
 

More from InternetCreations

Salesforce Developer Console for Admins
Salesforce Developer Console for AdminsSalesforce Developer Console for Admins
Salesforce Developer Console for AdminsInternetCreations
 
Proactive vs Reactive Support to Drive Success
Proactive vs Reactive Support to Drive SuccessProactive vs Reactive Support to Drive Success
Proactive vs Reactive Support to Drive SuccessInternetCreations
 
Why Salesforce Lightning? Why Now?
Why Salesforce Lightning? Why Now?Why Salesforce Lightning? Why Now?
Why Salesforce Lightning? Why Now?InternetCreations
 
The Life-Changing Magic of Tidying Up in Salesforce
The Life-Changing Magic of Tidying Up in SalesforceThe Life-Changing Magic of Tidying Up in Salesforce
The Life-Changing Magic of Tidying Up in SalesforceInternetCreations
 
Bundling up for Improved Case Metrics in Salesforce
Bundling up for Improved Case Metrics in SalesforceBundling up for Improved Case Metrics in Salesforce
Bundling up for Improved Case Metrics in SalesforceInternetCreations
 
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...InternetCreations
 
Reach Salesforce Service Cloud Nirvana in 5 Steps
Reach Salesforce Service Cloud Nirvana in 5 StepsReach Salesforce Service Cloud Nirvana in 5 Steps
Reach Salesforce Service Cloud Nirvana in 5 StepsInternetCreations
 
Yes, Your Salesforce Community Can Do That
Yes, Your Salesforce Community Can Do ThatYes, Your Salesforce Community Can Do That
Yes, Your Salesforce Community Can Do ThatInternetCreations
 
Spring '16 Release Notes & AppExchange 10th Birthday Bash
Spring '16 Release Notes & AppExchange 10th Birthday BashSpring '16 Release Notes & AppExchange 10th Birthday Bash
Spring '16 Release Notes & AppExchange 10th Birthday BashInternetCreations
 
Accelerating Cash Flow with Accounting Seed and Chargent
Accelerating Cash Flow with Accounting Seed and ChargentAccelerating Cash Flow with Accounting Seed and Chargent
Accelerating Cash Flow with Accounting Seed and ChargentInternetCreations
 
Summer of trailhead - Salesforce NJ User Group
Summer of trailhead - Salesforce NJ User GroupSummer of trailhead - Salesforce NJ User Group
Summer of trailhead - Salesforce NJ User GroupInternetCreations
 
Working at Internet Creations
Working at Internet Creations Working at Internet Creations
Working at Internet Creations InternetCreations
 
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...InternetCreations
 
Salesforce Spring '15 Release Notes Review with Alex Sutherland
Salesforce Spring '15 Release Notes Review with Alex SutherlandSalesforce Spring '15 Release Notes Review with Alex Sutherland
Salesforce Spring '15 Release Notes Review with Alex SutherlandInternetCreations
 
Deliver World-Class Customer Service with Salesforce
Deliver World-Class Customer Service with SalesforceDeliver World-Class Customer Service with Salesforce
Deliver World-Class Customer Service with SalesforceInternetCreations
 
Control your world using the Salesforce1 Platform (IoT)
Control your world using the Salesforce1 Platform (IoT)Control your world using the Salesforce1 Platform (IoT)
Control your world using the Salesforce1 Platform (IoT)InternetCreations
 
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)InternetCreations
 
Customer Service in Salesforce: Managing Cases Effectively
Customer Service in Salesforce: Managing Cases EffectivelyCustomer Service in Salesforce: Managing Cases Effectively
Customer Service in Salesforce: Managing Cases EffectivelyInternetCreations
 
5 apps to be more productive with salesforce cases
5 apps to be more productive with salesforce cases5 apps to be more productive with salesforce cases
5 apps to be more productive with salesforce casesInternetCreations
 

More from InternetCreations (20)

Salesforce Developer Console for Admins
Salesforce Developer Console for AdminsSalesforce Developer Console for Admins
Salesforce Developer Console for Admins
 
Proactive vs Reactive Support to Drive Success
Proactive vs Reactive Support to Drive SuccessProactive vs Reactive Support to Drive Success
Proactive vs Reactive Support to Drive Success
 
Why Salesforce Lightning? Why Now?
Why Salesforce Lightning? Why Now?Why Salesforce Lightning? Why Now?
Why Salesforce Lightning? Why Now?
 
The Life-Changing Magic of Tidying Up in Salesforce
The Life-Changing Magic of Tidying Up in SalesforceThe Life-Changing Magic of Tidying Up in Salesforce
The Life-Changing Magic of Tidying Up in Salesforce
 
KCS® is for Closers
KCS® is for ClosersKCS® is for Closers
KCS® is for Closers
 
Bundling up for Improved Case Metrics in Salesforce
Bundling up for Improved Case Metrics in SalesforceBundling up for Improved Case Metrics in Salesforce
Bundling up for Improved Case Metrics in Salesforce
 
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
Service Cloud Crystal Ball: The Now, the Soon, and the Future of Customer Ser...
 
Reach Salesforce Service Cloud Nirvana in 5 Steps
Reach Salesforce Service Cloud Nirvana in 5 StepsReach Salesforce Service Cloud Nirvana in 5 Steps
Reach Salesforce Service Cloud Nirvana in 5 Steps
 
Yes, Your Salesforce Community Can Do That
Yes, Your Salesforce Community Can Do ThatYes, Your Salesforce Community Can Do That
Yes, Your Salesforce Community Can Do That
 
Spring '16 Release Notes & AppExchange 10th Birthday Bash
Spring '16 Release Notes & AppExchange 10th Birthday BashSpring '16 Release Notes & AppExchange 10th Birthday Bash
Spring '16 Release Notes & AppExchange 10th Birthday Bash
 
Accelerating Cash Flow with Accounting Seed and Chargent
Accelerating Cash Flow with Accounting Seed and ChargentAccelerating Cash Flow with Accounting Seed and Chargent
Accelerating Cash Flow with Accounting Seed and Chargent
 
Summer of trailhead - Salesforce NJ User Group
Summer of trailhead - Salesforce NJ User GroupSummer of trailhead - Salesforce NJ User Group
Summer of trailhead - Salesforce NJ User Group
 
Working at Internet Creations
Working at Internet Creations Working at Internet Creations
Working at Internet Creations
 
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
PhillyForce 2015: Moving from Firefighting to Prevention with Voice of the Cu...
 
Salesforce Spring '15 Release Notes Review with Alex Sutherland
Salesforce Spring '15 Release Notes Review with Alex SutherlandSalesforce Spring '15 Release Notes Review with Alex Sutherland
Salesforce Spring '15 Release Notes Review with Alex Sutherland
 
Deliver World-Class Customer Service with Salesforce
Deliver World-Class Customer Service with SalesforceDeliver World-Class Customer Service with Salesforce
Deliver World-Class Customer Service with Salesforce
 
Control your world using the Salesforce1 Platform (IoT)
Control your world using the Salesforce1 Platform (IoT)Control your world using the Salesforce1 Platform (IoT)
Control your world using the Salesforce1 Platform (IoT)
 
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
Salesforce and Gmail Fully Integrated (NJ Salesforce User Group Event)
 
Customer Service in Salesforce: Managing Cases Effectively
Customer Service in Salesforce: Managing Cases EffectivelyCustomer Service in Salesforce: Managing Cases Effectively
Customer Service in Salesforce: Managing Cases Effectively
 
5 apps to be more productive with salesforce cases
5 apps to be more productive with salesforce cases5 apps to be more productive with salesforce cases
5 apps to be more productive with salesforce cases
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Salesforce New Jersey User Group - Security Awareness

  • 1.
  • 2. - Salesforce Pardot Marketing Automation & Data.com - March 24, 2-5pm @ The Heldrich Hotel in New Brunswick - 4th Annual PhillyForce Conference - May 4, 8:30–5pm @ Quorum Science Center - Salesforce World Tour NYC - May 25 @ Javits Center - New Jersey User Group Meeting - Date TBD, Salesforce MVP to discuss Summer 16’ Release Notes
  • 3. Securing Your Salesforce Org: The Human Factor New Jersey User Group Meeting
  • 4. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and man age our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not cu rrently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 5. Agenda ① Setting the Stage: The Human Factor (15 mins) ② Attack Card exercise and discussion (30 mins) ③ Secure Behavior (15 mins) ④ Secure Your Salesforce Org (15 mins) ⑤ Next Steps (15 mins)
  • 6. Setting the Stage: The Human Factor
  • 7. Why are we here? Estimated annual cost of global cybercrime
  • 9. Bugs in Human Hardware “Everybody else does it, why shouldn´t I?” “People are inherently good and I want to be helpful” “Hmmmm…. I wonder what will happen if I…” “I´d be wrong not to!” “If I don´t do this, I´ll get in trouble!” “I´ll get something if I do this!”
  • 12. Attack Card Instructions Step 1 Have one person in your group read an attack card aloud. • What “Bugs in Human hardware” and “Entry point methods” were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Step 2 For each attack card discuss the following:
  • 13. Attack Card Exercise #1: Linked-Into the Network 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 14. Attack Card Exercise #2: Download on the Road 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 15. Group Discussion 10 minutes • What Bugs in Human Hardware and Entry Point Methods were used in this attack? • What's the earliest point that the victim should have known this was an attack? • What could the individual have done to prevent it? • Do you think you would have identified the attack in time? If not, how would you have defended yourself? Entry Point Methods: Bugs in Human Hardware: Conformity, Fear, Reward, Morality, Curiosity, Trust Phishing/Malware, Rouge Devices, Dumpster Diving, Eaves-dropping, Badge Surfing, Exploiting Public Info, Social engineering
  • 17. Password Security • Activate password complexity and rotation rules  Password expiration/reset every 90 days  Password length at least 8-10 characters  Password complexity – mix alpha and numeric characters • User education  No password/credential sharing  Discourage password reuse across services  Utilization of a strong password manager (example: LastPass) • Utilize two-factor authentication (2FA) and single sign-on (SSO)
  • 18. Phishing Education • Pervasive and effective attack vector for installing malware • Education is key to prevention • https://trust.salesforce.com - recent threats • If unsure about a Salesforce email, ask us via security@salesforce.com • Don’t open attachments that are unexpected or from unknown senders
  • 19. Could your employees fall victim to phishing? • Internet Creations sent a phishing test to employees • https://getgophish.com
  • 20. Security Awareness for Users Small changes in behavior can have a major impact 14,000 50% 82% Less Likely to Click on a Phishing Link More Likely to Report Threats to security@salesforce.com Salesforce Employees
  • 21. Key Principles – The Human Factor • Limit the number of users with admin rights • Provide users with minimum access to do their job • Create rigorous process for user termination/deactivation • Basic security training for all users on credential/password security, phishing, and social engineering • Trailhead for ongoing, role-focused education • Effective security requires cross-org communication https://developer.salesforce.com/trailhead
  • 23. Trust: Security at Every Level Applicable to the Sales Cloud, Service Cloud, Communities, Chatter, database.com, site.com and Force.com. For audits, certification and security information or other services, please see the Trust & Compliance section of help.salesforce.com. Infrastructure-level SecurityApplication-level Security Firewall SSL Accelerators Web/App Servers Load Balancers Database Servers Trusted Networks Authentication Options Field Level Security Object Level Security (CRUD) Audit Trail Object History Tracking
  • 25. What is Two-Factor Authentication? +
  • 26. Two-Factor Authentication (2FA) • Provides an extra layer of security beyond a password • If a user’s credentials are compromised, much harder to exploit • Require a numeric token on login • Can be received via app, SMS, email, hardware (YubiKey) • Walkthrough in your own Org: http://sforce.co/1VWwmpB
  • 27. 2FA Setup ​Create a permission set titled “Two Factor Authentication” ​Name | Setup | Manage Users | Permission Sets | New Step 1
  • 28. 2FA Setup ​Select the “Two-Factor Authentication for User Interface Logins” permission and save this permission set. ​Now assign this permission set to the required user by clicking: ​Manage Assignment | Add Assignments | Select users | Assign Step 2
  • 29. 2FA Setup ​Upon the next login, users will come across the following prompt: Step 3
  • 30. Login IP Ranges • Limit IP addresses that users can log into Salesforce from (by profile) • Can restrict by login or on every request • Lock sessions to IP address they started on • These features ensure that if a malicious actor steals credentials they cannot use them away from your corporate networks • Working from home/road – VPN login
  • 31. Login IP Ranges • Recommended and available for all customers • Only access Salesforce from a designated set of IP Ranges • Two levels: • Org-level Trusted IP Ranges (permissive) • Profile-level Login IP Ranges (restrictive) Enterprise, Unlimited, Performance, Developer: Manage Users | Profiles Contact Mgr, Group, Professional: Security Controls | Session Settings For moreinfo,searchHelp& Training
  • 32. User Deactivation • Deactivateusers as soon as possible • Removes login access while preserving historical activity and records • Sometimes users cannot be deactivated: assign new user or reassign approval responsibilityfirst • Know your IT department’s termination process Best practice: Freeze users first! From Setup, click Manage Users | Users. Click Edit next to a user’s name. Deselect the Active checkbox and then click Save.
  • 34. Key Takeaways Check your Security Settings! Activate and use turnkey security features: • Enable two-factor authentication • Implement identity confirmation • Activate Login IP Ranges • Deactivate users in a timely manner (freeze them first!) Consider the human factor when training Salesforce users: • Password security • Emails / phishing
  • 35. Resources • Security for Admins Quick Reference Guide (available today!) • Security & Compliance Release Webinars – What’s New in Security & Compliance, Spring ‘16 (Feb. 25, 8am PST) • Trailhead: Data Security module (more coming soon!) • Who Sees What video series (YouTube) • Dreamforce session recordings (www.dreamforce.com) • Secure Salesforce series • Create a Salesforce Force Field for Your Users • Security Implementation Guide • ButtonClickAdmin.com